Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 340149

Summary: net-mail/ripmime _FORTIFY_SOURCE indicates presence of overflow
Product: Gentoo Linux Reporter: Diego Elio Pettenò (RETIRED) <flameeyes>
Component: New packagesAssignee: Net-Mail Packages <net-mail+disabled>
Status: RESOLVED FIXED    
Severity: major CC: hardened
Priority: High    
Version: unspecified   
Hardware: All   
OS: Linux   
Whiteboard:
Package list:
Runtime testing required: ---
Bug Depends on:    
Bug Blocks: 259417    
Attachments: Build log
Patch to ripmime-1.4.0.9.ebuild to address buffer overflow

Description Diego Elio Pettenò (RETIRED) gentoo-dev 2010-10-08 13:27:16 UTC
You're receiving this bug because the package in Summary has produced _FORTIFY_SOURCE related warnings indicating the presence of a sure overflow in a static buffer.

Even though this is not always an indication of a security problem it might even be. So please check this out ASAP.

By the way, _FORTIFY_SOURCE is disabled when you disable optimisation, so don't try finding out the cause using -O0.

Thanks,
Your friendly neighborhood tinderboxer
Comment 1 Diego Elio Pettenò (RETIRED) gentoo-dev 2010-10-08 13:27:27 UTC
Created attachment 249936 [details]
Build log
Comment 2 Kevin Pyle 2010-10-09 17:30:49 UTC
Created attachment 250039 [details, diff]
Patch to ripmime-1.4.0.9.ebuild to address buffer overflow

This patch adds a sed call to rewrite the offending snprintf to use the correct length.  Before applying it, you must also apply the ebuild patch posted in bug #334593 as attachment #244793 [details, diff] (which in turn applies new patch file attachment #244791 [details, diff]).
Comment 3 Tim Harder gentoo-dev 2010-11-07 21:29:51 UTC
Fixed in CVS.